Clustering-based data integrity verification approach for multi-replica in a fog environment

被引:0
|
作者
K. Uma Maheswari
S. Mary Saira Bhanu
Nickolas Savarimuthu
机构
[1] National Institute of Technology,Department of Computer Science and Engineering
[2] National Institute of Technology,Department of Computer Applications
来源
关键词
Fog computing; Data integrity; Data replica; Corruption localization; Fuzzy clustering;
D O I
暂无
中图分类号
学科分类号
摘要
Due to dynamic changes, applications designed for the Internet of Things (IoT) require new storage resources. Storing IoT data in a fog infrastructure is a common practice to guarantee the IoT application’s high performance. Multiple fog nodes spread the data replica to accommodate multiple users and reduce access latency. However, such data replicas are subjected to intentional and accidental corruption. This paper proposes a data integrity verification approach in a distributed fog environment. The proposed work uses fuzzy clustering and consensus mechanism to verify the integrity of multiple replicas stored on distributed fog nodes. Security analysis shows that the proposed approach is highly resistant to replace, replay, and forgery attacks. Performance analysis demonstrates the practicability of the proposed approach in a fog environment.
引用
收藏
页码:3089 / 3113
页数:24
相关论文
共 50 条
  • [1] Clustering-based data integrity verification approach for multi-replica in a fog environment
    Maheswari, K. Uma
    Bhanu, S. Mary Saira
    Savarimuthu, Nickolas
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (03): : 3089 - 3113
  • [2] Multi-replica Dynamic Data Verification for Cloud Computing
    Luo, Wenjun
    Liu, Lu
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2939 - 2944
  • [3] Efficient Multi-Replica Cloud Data Integrity Checking Method Based on Enhanced PRF
    George, Anju Susan
    Nargunam, A. Shajin
    [J]. IETE JOURNAL OF RESEARCH, 2024, 70 (01) : 396 - 404
  • [4] Multi-Replica Cloud Data Storage Based on Hierarchical Network Coding
    Xu G.
    Shi C.
    Feng X.
    Luo X.
    Shi X.
    Han S.
    Li W.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (02): : 293 - 304
  • [5] Identity-Based Public Multi-Replica Provable Data Possession
    Peng, Su
    Zhou, Fucai
    Wang, Qiang
    Xu, Zifeng
    Xu, Jian
    [J]. IEEE ACCESS, 2017, 5 : 26990 - 27001
  • [6] Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [7] An arbitrable multi-replica data auditing scheme based on smart contracts
    Tian, Junfeng
    Yang, Qian
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22):
  • [8] A controllable multi-replica routing approach for opportunistic networks
    Zhao, Ruonan
    Wang, Xiaoming
    Lin, Yaguang
    Yang, Yunhui
    Hui, Tiantian
    Zhang, Lichen
    [J]. IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2017, 12 (04) : 589 - 600
  • [9] CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers
    Li, Tengfei
    Chu, Jianfeng
    Hu, Liang
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (01) : 154 - 162
  • [10] Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain
    Yang, Xiaodong
    Pei, Xizhen
    Wang, Meiding
    Li, Ting
    Wang, Caifen
    [J]. IEEE ACCESS, 2020, 8 (08): : 144809 - 144822